Feeds
50%
Signature SWaP

SWaP Signature watchphone

Timepiece telephony

  • alert
  • submit to reddit

High performance access to file storage

For reasons we can’t begin to fathom, a few apps are hidden away in the Settings menu. An Organiser sub-menu gives you access to calendar, to-do list manager, alarm, a world clock, calculator, Bluetooth settings and the already noted ebook reader.

Signature SWaP

The clasp is bulky
And that's the camera lens you can see on the side

The reader copes with text files only, and displays four to five rows of text at once - partial height rows are displayed. You can set bookmarks and search, but for all but the simplest of notes, it's not to be recommended – it just doesn’t show enough text at any one time.

The calendar lets you view tasks, but it is very simplistic and anyone who really needs to keep tabs on their schedule is going to want something more sophisticated than what’s on offer here. With no PC sync you have to manually set up every task on the phone, which is a tedious process.

You charge the watch using a micro USB connector which has a sliding cover. Battery life is quoted as 150-180 minutes of talk time and up to 100 hours on standby. A solid half day of usage after a full charge barely put a dent in the battery, but if you're going to rely on the Signature as your everyday watch, you’ll no doubt want to recharge it daily to be on the safe side.

Verdict

It's difficult to be kind about the Signature SWaP. It does do one job well: voice calls were remarkably clear at both ends of conversations. But it's hard to get excited about the remaining features. Video and stills photography are insultingly poor, the user interface is a fiddle to manage, and the watch itself is chunky to wear. The build is solid, but that and good call quality aren’t enough to lift the Signature out of the doldrums. ®

More Watch Reviews...


LG GD910

Fossil
FX2008

High performance access to file storage

50%
Signature SWaP

SWaP Signature watchphone

As a voice-centric phone, it works. But the other features it has crammed into it disappoint.
Price: £350 RRP

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.